MARP: Mobile Agent for RFID Privacy Protection

  • Soo-Cheol Kim
  • Sang-Soo Yeo
  • Sung Kwon Kim
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3928)


Recently many researchers in various fields has noticed RFID system. RFID system has many advantages more than other automatic identification system. However, it has some consumer privacy problems, such as location tracking and disclosure of personal information. Most of related works have focused on the cryptographic scheme for the RFID tag and the reader. In this paper, a proxy agent scheme using personal mobile device for the privacy protection. Our MARP, mobile agent for RFID privacy protection, has strong cryptographic modules with a powerful CPU and battery system and guarantees more high-level security than other protection schemes. MARP acquires a tag’s secrete information partially and becomes the proxy agent of the tag which is in its sleep mode. All readers can communicate with MARP instead of the tag and can attempt authentication with MARP. Since the tag should have only one hash module in the environment of MARP, we can use the existing tag hardware with slight modification for protection consumer’s privacy in RFID system.


Mobile Agent Privacy Protection Mutual Authentication Sleep Mode Secret Data 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Finkenzeller, K.: RFID handbook. John Wiley & Sons, Chichester (1999)Google Scholar
  2. 2.
    Brock, D.: The Electronic Product Code - A Naming Scheme for physical Objects, Auto-ID White Paper (January 2001),
  3. 3.
    Knospe, H., Pobl, H.: RFID Security. Infomation Security Technical Report 9(4), 39–50 (2004)CrossRefGoogle Scholar
  4. 4.
    Sarma, S., Weis, S., Engels, D.: Radio-Frequency Identification: Security Risks and Challenges. Cryptobytes 6(1), 2–9 (2003)Google Scholar
  5. 5.
    Avoine, G., Oechslin, P.: RFID Traceability: A Multilayer Problem. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 125–140. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  6. 6.
    Anderson, R., Kuhn, M.: Low Cost Attacks on Tamper Resistant Devices. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 125–135. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  7. 7.
    Weis, S., Sarma, S., Rivest, R., Engels, D.: Security and Privacy Aspects of Lowcost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 454–469. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  8. 8.
    Sarma, S., Weis, S., Engels, D.: RFID Systems and Security and Privacy Implications. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454–469. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  9. 9.
    Juels, A., Rivest, R., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In: Computer and Communications Security - ACM CCS 2003, pp. 27–30 (October 2003)Google Scholar
  10. 10.
    Juels, A., Brainard, J.: Soft Blocking: Flexible Blocker Tags on the Cheap. In: Workshop on Privacy in the Electronic Society - WPES 2004, pp. 1–7 (October 2004)Google Scholar
  11. 11.
    Rieback, M., Crispo, B., Tanenbaum, A.: RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 184–194. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  12. 12.
    Tanenbaum, A., Gaydadjiev, G., Crispo, B., Rieback, M., Stafylarakis, D., Zhang, C.: The RFID Guardian Project,
  13. 13.
    Avoine, G.: Adversarial Model for Radio Frequency Identification, Cryptology ePrint Archive, Report 2005/049 (2005),
  14. 14.
    Saito, J., Ryou, J., Sakurai, K.: Engancing Privacy of Universal Re-Encryption Scheme for RFID Tags. In: Yang, L.T., Guo, M., Gao, G.R., Jha, N.K. (eds.) EUC 2004. LNCS, vol. 3207, pp. 879–890. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  15. 15.
    Golle, P., Jakobsson, M., Juels, A., Syverson, P.F.: Universal Re-Encryption for Mixnet. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 163–178. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  16. 16.
    Konomi, S.: Personal Privacy Assistants for RFID Users. In: International Workshop Series on RFID (November 2004)Google Scholar
  17. 17.
    Juels, A., Syverson, P., Bailey, D.: High-Power Proxies for Enhancing RFID Privacy and Utility. In: Center for High Assurance Computer Systems – CHACS (August. 2005)Google Scholar
  18. 18.
    Gao, X., Xiang, Z., Wang, G., Shen, J., Huang, J., Song, S.: An Approach to Security and Privacy of RFID System for Supply Chain. In: Conference on E-Commerce Technology for Dynamic E-Business – CEC-East 2004, pp. 164–168 (September 2005)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2006

Authors and Affiliations

  • Soo-Cheol Kim
    • 1
  • Sang-Soo Yeo
    • 1
  • Sung Kwon Kim
    • 1
  1. 1.Chung-Ang UniversitySeoulKorea

Personalised recommendations